Abstract— Software components embedded in ubiquitous systems, especially those using wireless networking, are subject to unpredictable behaviors inherent to using these systems i...
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
A key objective of ATM-based networks is to provide at the same time guaranteed QoS to real time and non-real time services. This calls for thoroughly engineered traffic control m...